• Title/Summary/Keyword: L2 Security

Search Result 152, Processing Time 0.022 seconds

A Convergence Study on the Effects of NH3/NOx Ratio and Catalyst Type on the NOx Reduction by Urea-SCR System of Diesel Engine (디젤엔진의 Urea-SCR 시스템에 의한 NH3/NOx 비율 및 촉매 방식이 NOx 저감에 미치는 영향에 관한 융합연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.4
    • /
    • pp.131-138
    • /
    • 2019
  • Diesel engines have important advantages over its gasoline counterpart including high thermal efficiency, high fuel economy and low emissions of CO, HC and $CO_2$. However, NOx reducing is more difficult on diesel engines because of the high $O_2$ concentration in the exhaust, marking general three way catalytic converter ineffective. Two method available technologies for continuous NOx reduction onboard diesel engines are Urea-SCR and LNT. The implementation of the Urea-SCR systems in design engines have made it possible for 2.5l and over engines to meet the tightened NOx emission standard of Euro-6. In this study, we investigate the characteristics of NOx reduction with respect to engine speed, load, types of catalyst and the $NH_3$/NOx ratio and present the conditions which maximize NOx reduction. Also we provide detailed experimental data on Urea-SCR which can be used for the preparation for standards beyond Euro-6.

Improved Security Analysis of Reduced SMS4 Block Cipher (축소된 SMS4 블록 암호에 대한 향상된 안전성 분석)

  • Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie;Sung, Jae-Chul;Lee, Chang-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.3-10
    • /
    • 2009
  • In this paper, we introduce improved differential and linear attacks on the SMS4 block cipher which is used in the Chinese national standard WAPI (WLAN Authentication and Privacy Infrastructure, WLAN - Wireless Local Area Network): First, we introduce how to extend previously known differential attacks on SMS4 from 20 or 21 to 22 out of the full 32 rounds. Second, we improve a previously known linear attack on 22-round reduced SMS4 from $2^{119}$ known plaintexts, $2^{109}$ memory bytes, $2^{117}$ encryptions to $2^{117}$ known plaintexts, $2^{l09}$ memory bytes, $2^{112.24}$ encryptions, by using a new linear approximation.

Hydrophobic modification conditions of Al2O3 ceramic membrane and application in seawater desalination

  • Lian li;Zhongcao Yang;Lufen Li
    • Membrane and Water Treatment
    • /
    • v.15 no.1
    • /
    • pp.21-29
    • /
    • 2024
  • 1H,1H,2H,2H-perfluorodecytriethoxysilane (C16H19F17O3Si) be successfully applied to the hydrophobic modification of Al2O3 tubular ceramic membrane. Taking the concentration of modification solution, modification time, and modification temperature as factors, orthogonal experiments were designed to study the hydrophobicity of the composite membranes. The experiments showed that the modification time had the greatest impact on the experimental results, followed by the modification temperature, and the modification solution concentration had the smallest impact. Concentration of the modified solution 0.012 mol·L-1, modification temperature 30 ℃ and modification time 24 h were considered optimal hydrophobic modification conditions. And the pure water flux reached 274.80 kg·m-2·h-1 at 0.1MPa before hydrophobic modification, whereas the modified membrane completely blocked liquid water permeation at pressures less than 0.1MPa. Air gap membrane distillation experiments were conducted for NaCl (2wt%) solution, and the maximum flux reached 4.20 kg·m-2·h-1, while the retention rate remained above 99.8%. Given the scarcity of freshwater resources in coastal areas, the article proposed a system for seawater desalination using air conditioning waste heat, and conducted preliminary research on its freshwater production performance using Aspen Plus. Finally, the proposed system achieved a freshwater production capacity of 0.61 kg·m-2·h-1.

An Advanced Resource Allocation Algorithm for PON-LTE Converged Networks

  • Abhishek Gaur;Vibhakar Shrimali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.16-22
    • /
    • 2023
  • Enhanced radio access technologies (RAT) are deployed in Next Generation Convergence Networks by the service providers so as to satisfy the basic requirements of end-users for e.g. QoS. Whenever the available resources are being shared simultaneously and dynamically by multiple users or distribution of allocated channels randomly, the deficiency of spectral resources and dynamic behavior of Network traffic in real time Networking, we may have problem. In order to evaluate the performance of our proposed algorithm, computer simulation has been performed on NS-2 simulator and a comparison with the existing algorithms has been made.

Novel Optimizer AdamW+ implementation in LSTM Model for DGA Detection

  • Awais Javed;Adnan Rashdi;Imran Rashid;Faisal Amir
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.133-141
    • /
    • 2023
  • This work take deeper analysis of Adaptive Moment Estimation (Adam) and Adam with Weight Decay (AdamW) implementation in real world text classification problem (DGA Malware Detection). AdamW is introduced by decoupling weight decay from L2 regularization and implemented as improved optimizer. This work introduces a novel implementation of AdamW variant as AdamW+ by further simplifying weight decay implementation in AdamW. DGA malware detection LSTM models results for Adam, AdamW and AdamW+ are evaluated on various DGA families/ groups as multiclass text classification. Proposed AdamW+ optimizer results has shown improvement in all standard performance metrics over Adam and AdamW. Analysis of outcome has shown that novel optimizer has outperformed both Adam and AdamW text classification based problems.

A Study for risk management on Documentary Collection(D/P, D/A) Payment (추심결제(D/P, D/A)방식에서의 위험관리에 관한 연구)

  • Kwak, Su-Young
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.283-304
    • /
    • 2008
  • According to globalization and localization of world economics international trade payment method was also changed. A traditional payment was Letter of Credit basis, however it is being increased to various methods such as remittance, documentary collection(D/P, D/A) and open account. In order to acquire a secure export payment, exporters prefer to L/C basis which is guaranteed by a reliable bank. However, the L/C should bear a security so that importers would rather documentary collection than L/C. The reasons for the preference of collection payment rather than L/C are a low commission cost, the conversion of buyer's market from seller's market due to severe competition in the world market, transaction increase between main office and branches and a right to control the goods until executing the payment by exporters. Besides of them, collection payment can handle safer and faster than open account basis. However, the collection payment has a risk which it isn't guaranteed by bank for the payment so that I would suggest countermeasures to minimize the payment risk utilizing the collection basis as follows; using export credit insurance system, a large domestic credit report provider such as D&B for absolutely fresh and new information, a collection proxy service for overseas deferred credit and suggestion specifying to order B/L not straight one on consignee in order to transfer the right of ownership with endorsement without problem.

  • PDF

The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch (네트워크 통합관리시스템과 보안스위치를 이용한 반송정수장 무선랜 구축사례)

  • Park, Eunchul;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.4
    • /
    • pp.309-315
    • /
    • 2018
  • Currently, the commercialization of the $5^{th}$ Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.

A Packet encryption scheme and extension of Cryptoki for connectionless packet network (고속 패킷 통신을 위한 패킷 암호 스킴과 Cryptoki 확장 방안)

  • Ko, Haeng-Seok;Park, Sang-Hyun;Kwon, Oh-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.83-92
    • /
    • 2007
  • In connectionless packet network, if a sender encrypts packets by block chaining mode and send it to receiver, the receiver should decrypt packets in encrypted order that is not received order. Therefore, the performance and efficiency are lowered for crypto communication system. To solve this problem, we propose packet encryption scheme for connectionless packet network that can decrypt the packets independently, even if the received order of packets are changed or packets are missed. The scheme makes new IV(Initial Vector) using IV that created by key exchange process and salt that made by random number. We propose extended Cryptoki API that added packet encryption/decryption functions and mechanism for improving convenience and performance. We implement the scheme and get result that the performance increased about $1.5{\sim}l5.6$ times compare with in case of implementing using Cryptoki API in the test environment.

BPFast: An eBPF/XDP-Based High-Performance Packet Payload Inspection System for Cloud Environments (BPFast: 클라우드 환경을 위한 eBPF/XDP 기반 고속 네트워크 패킷 페이로드 검사 시스템)

  • You, Myoung-sung;Kim, Jin-woo;Shin, Seung-won;Park, Tae-june
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.213-225
    • /
    • 2022
  • Containerization, a lightweight virtualization technology, enables agile deployments of enterprise-scale microservices in modern cloud environments. However, containerization also opens a new window for adversaries who aim to disrupt the cloud environments. Since microservices are composed of multiple containers connected through a virtual network, a single compromised container can carry out network-level attacks to hijack its neighboring containers. While existing solutions protect containers against such attacks by using network access controls, they still have severe limitations in terms of performance. More specifically, they significantly degrade network performance when processing packet payloads for L7 access controls (e.g., HTTP). To address this problem, we present BPFast, an eBPF/XDP-based payload inspection system for containers. BPFast inspects headers and payloads of packets at a kernel-level without any user-level components. We evaluate a prototype of BPFast on a Kubernetes environment. Our results show that BPFast outperforms state-of-the-art solutions by up to 7x in network latency and throughput.

COTS-Based Development of Power System Data Visualization Program (COTS기반의 전력계통 데이터 시각화 프로그램 개발)

  • Oh, Sea-Seung;Jang, Gil-Soo;Moon, Seung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.184-186
    • /
    • 2007
  • Visualization has a strong capability to manage and display a large volume of data. It makes system analysis more intuitive and helps an operator in monitoring system status, understanding its phenomena, identifying its problems, and performing corrective action to maintain the security of the system. In this paper visualization program is developed based on a COTS-based software development concept in a distributed environment using open-source application software and development tools.

  • PDF